Dear all,

I have a zone local.grf.hr administered by AD, DHCP and DDNS ran by Windows Server 2016 (not by my architectural choice). However, since Windows Server 2016 had round-robin strategy of inquiring the forwarders, it performed worse than BIND9 on old Debian server.

So, I had the BIND9 as the secondary server ("slave" is somewhat politically incorrect) and I wanted to secure transactions with TSIG HMAC-SHA256 or stronger, as between Debian
BIND9 servers.

I've been Googling around, and they say it cannot be done, because Windows Server uses
special proprietary GSS-TSIG. The article was for an earlier version of WS.

Has there been some improvement in the meantime?

We are thinking about moving DHCP server to Linux, but it is a huge job to convert the
reservations, so it may not be done in the next couple of months.

I would like to secure DNS xfers from zone poisoning in the meantime, considering the recent surge of cyber attacks since the recent war started, and our country voted support for the
defending party.

Frankly, I am not in deep with Microsoft DNS, and I guess there can be some tweaking with the PowerShell, and maybe even some undocumented features, but right now I am presented
with a problem I can't seem to solve because it is not an open system.

Thanks for any help.

Kind regards,
Mirsad Todorovac

--
Mirsad Goran Todorovac
CARNet sistem inženjer
Grafički fakultet | Akademija likovnih umjetnosti
Sveučilište u Zagrebu

--
CARNet system engineer
Faculty of Graphic Arts | Academy of Fine Arts
University of Zagreb, Republic of Croatia
tel. +385 (0)1 3711 451
mob. +385 91 57 88 355

--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to